tex2e / chacha20-poly1305
ChaCha20 and Poly1305 for IETF Protocols (RFC 8439)
☆18Updated 3 years ago
Alternatives and similar repositories for chacha20-poly1305:
Users that are interested in chacha20-poly1305 are comparing it to the libraries listed below
- ☆12Updated 5 years ago
- Differential fault analysis framework for AES128☆48Updated 11 years ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆29Updated 2 months ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- White-box Design and Analysis kit☆23Updated last year
- ☆20Updated 5 years ago
- A bitsliced implementation of ECB and CTR AES☆50Updated 8 months ago
- Side-channel traces visualizer☆15Updated last week
- Secure AES128 Encryption Implementation for ATmega8515☆35Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last year
- ☆15Updated 4 years ago
- A Sage implementation of the ROCA attack☆22Updated last year
- ☆16Updated 2 years ago
- Tool for generating Elliptic curve domain parameters☆121Updated last week
- Small portable HMAC in C☆74Updated 6 months ago
- NIST Lightweight Cryptography Primitives☆55Updated 2 years ago
- DFA scripts using Jlsca☆10Updated 5 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆13Updated last week
- ☆32Updated 3 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆13Updated 4 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 6 months ago
- Pure python ChaCha20Poly1305 implementation☆25Updated 5 years ago
- Encryption Algorithm Combined☆25Updated 9 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- ☆12Updated 3 years ago
- ☆20Updated 3 years ago
- ☆17Updated 4 years ago
- Prediction algorithms for the PCG pseudo-random generator☆11Updated 4 years ago
- ☆15Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year